This page aims to help you remove the .Thor Virus for free. Our instructions also cover how any .Thor ransomware-encrypted files can be recovered.

.Thor is very similar to the recently released .Odin ransomware

The following paragraphs describe .Thor – a Ransomware-based program. Ransomware is a kind of malware that blackmails the affected user into paying ransom. However, the person himself/herself is not the actual hostage, their files are. This virus type is truly terrifying and might scare you a lot. What’s even more bothering is the fact that once your files get encrypted and the ransom alert has been generated, little could really be done to reverse that horrifying process. We hope that the article below will give you some valuable information about the fight against the programs from the Ransomware family. This article (and removal guide) was created with the help of the kind people from howtoremove.guide, and specifically their .Thor File Virus page.

.Thor Ransomware is a nasty customer.
The .Thor Virus will render your files unusable.

The synonym for online harassment – Ransomware

As stated above, the programs based on Ransomware are experts at secretly infiltrating your device and making your important files completely inaccessible to you. After that, the scenario that follows is very well-known – you receive a horrifying screen-covering alert message, saying you have to pay a certain ransom amount for unblocking your data or it will be destroyed for good. Such statements are truly scary, aren’t they?

The process of an infection with .Thor

Such a cyber disaster may happen to you in many different ways:

  • Malicious online advertisements (“malvertising”) – such a virus could be automatically caught by opening a fake pop-up or other ad. Such ads are frequently generated on contagious or suspicious websites.
  • Fake operating-system updates – sometimes the virus might come to you as an update request made to resemble the ones your OS usually displays. In fact, only few users could really spot the differences between a fake update and an original one. Maybe that’s why this distribution method is particularly well-spread. After you agree to complete such an update, your computer gets contaminated with .Thor.
  • Suspicious letters from your email – such letters containing viruses could be found both inside your spam folder and your Inbox. Be really cautious, as they usually come from unknown or shady-appearing addresses and senders. Once you open such a letter, or follow any link inside it, you catch the virus.
  • The attachments of the aforementioned letters – even email attachments could be contagious. As a result, we strongly recommend that you completely avoid downloading or opening any suspicious email attachments, because this way you may get infected with this harmful malware. Usually in this case the Ransomware doesn’t come alone – it is packed together with a Trojan. The Trojan is the tool used for infiltrating your system via a vulnerability.

The process of .Thor’s file encryption

No matter how your system has caught .Thor, the steps that the virus performs after the infection are the following:

  • Firstly, all your drives and disks are carefully checked for all the data that the malware considers worth encrypting (the files you most commonly use).
  • Secondly, a list with all such files gets created. Then the encryption with a complex double key takes place until the last file from the list gets encoded.
  • The last step is the generation of the scary ransom-extorting notification. Normally you get one containing payment information as well as some more threats about the condition and future of your files.

Could such an infection and encryption processes be spotted on time?

Some users have reported noticing a strange process in their Task Managers. This rarely happens, though. However, if you happen to notice such odd activity, turn off your computer as soon as you can. Also, make sure that you disconnect it from all professional, home and Internet networks so that you can prevent the spreading of the contamination to other devices. Maybe if you do all that, you will be able to intercept the encryption process. Consult a specialist for that purpose.

Can such a contamination be dealt with?

You have to understand that it is really complicated to fight such a malware infection. No actions from your side could ever guarantee a positive outcome. Still, there are a few options you could try before deciding to complete the payment of the ransom.
Firstly, you may try the instructions in the removal guide below for safely removing and at least trying to decrypt your data. Our removal tool can also help you delete the virus. Also, search the web for software that might help with the decryption if the instructions in the guide don’t work.

SUMMARY:

Name .Thor
Type Ransomware
Danger Level High (Ransomware is by far the worst threat you can encounter)
Symptoms  Generally, if Ransomware is currently encrypting your files, your machine should experience high amounts of CPU, RAM and hard-drive free space usage without any visible reason.
Distribution Method Malicious messages and harmful hyperlinks that get sent to you are one of the most common methods. Another common technique is via the help of another program that serves as a backdoor into your system.

.Thor Virus Removal

Step1

Reveal Hidden Files. If you don’t know how to do this, please check our Guide.

Step 2

Start Button => Search=> Copy/Paste “notepad %windir%/system32/Drivers/etc/hosts” => Enter.

Hosts File

If you notice other IPs different from the localhost IPs – you might be in danger!

Localhost IPs

Ask for additional help in the comments.

Step 3

Right click on the Taskbar => Start Task Manager.

Start Windows Task Manager

Navigate to Processes.

Processes in Task Manager

Locate any suspicious processes associated with .Thor Virus. Right click on the process = > Open File Location => End Process = > Delete the directories with the suspicious files.

Step 4

Start Button => Search => Type:

  • %AppData%
  • %LocalAppData%
  • %ProgramData%
  • %WinDir%
  • %Temp%

Type in Search

Hit Enter after each new search. Check each Folder and delete recent entries.

Step 5

Get Your Files Back!

The only way you can do that is by backpedaling to a moment when you were not infected. You can achieve this in one of two ways:

  • System Restore.Start Button=> Search field => Type System Restore => Enter.
    Choose a Restore Point.
    Restore Point
    Click Next until the process has been completed.
  • Google and Download a Program called ShadowExplorer. Install and open it => Choose theDrive letter (C:, D:, F:, etc.) and date you want to restore information from => Right click on the files you want restored => Export.

If you run into any trouble – ask us for help in the comments section!